5 Introduction According to a study released by Frost & Sullivan, in Europe, Middle East and Africa there will be a need of 1,15 million Cyber Security Experts by Despite the strong demand, the education programs specific on Cyber Security are still very limited in most countries. The Global Cyber Security Center Foundation (GCSEC) recognizes the importance of higher education on Cyber Security and will deliver a Master on Cyber Security starting from Fall The electronic handling of information is a defining technology of our age. Enormous volumes of information are routinely stored and transmitted worldwide indeed, most aspects of our daily lives would come to a halt should the information infrastructure fail. The field of Information Security, namely the study of countermeasures to real and serious threats to information security, has grown very rapidly in recent years. The subject embraces technologies such as cryptography, computer security, network security, digital forensics and fraud detection, as well as considering the management of security and the many trade-offs and subjective issues that need to be addressed when implementing information security within an organisation. This MSc is a non-mathematical course. The programme, which can be studied part-time (block mode) or by distance learning, provides students with a systematic understanding and critical awareness of current threats to the security of electronic information and the measures available to counteract these. It is designed to introduce all technical, legal and commercial aspects of Information Security and is intended as a foundation, or a building block, for a career in the field. Students come from a variety of backgrounds, ranging from new graduates through to very senior security managers (often from blue chip enterprises). They are seeking a formal qualification in Information Security on a course that is well respected and well-known as the first of its kind in the world. To date more than 1,500 students from over 40 countries have completed the course.!

6 Master in Cyber Security The program aims to target Managers, Executives and Government officials who want to improve their knowledge and skills on Cyber Security through an internationally recognized Master. The Master is delivered in partnership with Royal Holloway University of London and is based on their famous program built by the historical Information Security Group. At the end of the Master, students will get a legally valid II Level Master Degree issued by GCSEC and Royal Holloway University of London. The program spans a wide range of topics, from Technical Security to Information Security Governance, from Cyber Crime to Cryptography. The Master has been specifically designed for working Managers and Executives: the program consists of six one-week modules, delivered in two years for a total of 240 hours of lessons. Students can follow the entire program in Rome, in the new headquarter of GCSEC Foundation, or up to two modules at the Royal Holloway campus in Egham (Surrey United Kingdom). At the end of the Master program, students will develop a thesis based on a project, that can be hosted by GCSEC Members or Master Sponsors. Participants are expected to find employment in both industry and commerce as Security Managers/ Executives: the need for such experts is likely to be very high for the foreseeable future. Each class will have a minimum number of 20 students. The Master will be delivered in English. "

7 About GCSEC The Global Cyber Security Center (GCSEC) is an international not-forprofit Foundation based in Rome entirely dedicated to Cyber Security. Founded by Poste Italiane, GCSEC is supported by its members and participants: ENEL Group, Mastercard Corp. and Almaviva. GCSEC has also developed strategic Partnerships with Italian and International government institutions, private bodies and research institutions. GCSEC is based on a collaborative model where international government institutions, academia, research, industry, operators and associations work together to develop and share knowledge on Cyber Security topics. In particular the goals of GCSEC are to: Act as a leader, facilitator and resource of knowledge and culture in matters pertaining to Cyber Security Support Italian and international organizations in acquiring knowledge and experience Contribute towards the development of managerial, technical, and operational best practices and standards for better protection of citizens, the government and private organizations Advance the policy debate on issues relevant to the secure use of ICTs technologies Promote the global harmonization of laws and procedures to counter cybercrime. The main activities of GCSEC include: Providing specialized education and training Promoting awareness and communication on Cyber Security Initiating and promoting applied Research & Development projects Facilitating the exchange of Information between public and private bodies at national and international level Providing specialized support to policy makers for the definition of national and international laws, best practices, strategies, and standards. #

8 Information Security Group and Royal Holloway The Information Security Group is an interdisciplinary research group of computer scientists, mathematicians and social scientists. It is one of the largest academic information security groups in the world (with visiting professors and fellows, research assistants, support staff and around 60 PhD students complementing the core team of 17 academic staff). It has strong links with a number of industrial and government institutions and, in 1992, it introduced the MSc in Information Security, the first course of its kind in the world. The Group holds a regular seminar series with considerable industrial participation and sponsorship, and the annual HewlettPackard Security Colloquium is held at Royal Holloway. As well as conducting several research projects funded by government and industry, the information Security Group is active in the European Union research programme ECRYPT and contributes to the International Technology Alliance programme supported by the MoD and DoD. The ISG incorporates the Smart Card Centre, a venture established by Royal Holloway, Giesecke & Devrient and Vodafone as a venue for research and teaching on smart cards and tokens and their applications. $

9 Admission Depending on students backgrounds, they might be asked to attend an oral examination or an interview. They will be selected on the basis of their academic and professional curriculum and their knowledge of English. Entry requirements for Master are the following: Degree (five years) in a relevant discipline (includes, but is not restricted to, computer science, electronics, information systems and mathematics) Short degree (3 years) in a relevant discipline (includes, but is not restricted to, computer science, electronics, information systems and mathematics) to get a I Level Master Degree High School diploma with appropriate industrial or commercial experience A good knowledge of English language is required. Non-standard applications are viewed sympathetically, each case being considered individually on its merits. Applicants with relevant work experience and industry certifications are particularly encouraged to apply. %

10 Program Overview The Master program is based on four mandatory courses and two options of alternative courses. At the end of the Master program, students will develop a thesis based on a project, that can be hosted by GCSEC Members or Master Sponsors. Students can follow the entire program in Rome, in the new headquarter of GCSEC Foundation, or up to two optional modules at the Royal Holloway campus in Egham (Surrey - United Kingdom). Mandatory Courses Security Management Introduction to Cryptography and Security Mechanisms Legal and regulatory aspects of electronic commerce Security Technologies Alternative courses - option 1 Application and Business Security Development Standards and Evaluation Criteria Alternative courses - option 2 Computer Crime Smart Cards/Tokens Security and Applications Assessment The mandatory core element (total of four modules) contributes 50 percent towards the final award. The options element (total of two modules) contributes 25 percent towards the final award. The compulsory project element contributes 25 percent towards the final award. The modules that comprise the core and options elements are all assessed by twohour written examination papers. For the options element, students must sit at least two options exams. However, students can choose to sit three options exams. In this case, only the two highest marks will be used when determining the classification of the degree (but the degree transcript will still record information about all completed modules). The Project is a significant piece of individual work assessed by a report of between 10,000 and 20,000 words. As a very rough guide, the project report should be around 50 pages long. This measure assumes fairly dense text, reasonable line spacing, font size (typically between 10 and 12) and the use of reasonable margins. &'

11 The Project and the optional modules give students the opportunity to pursue their own interests in more detail. The Project is a major individual piece of work. It can be of academic nature and aim at acquiring and demonstrating understanding and the ability to reason about some specific area of information security. Alternatively, the project work may document the ability to deal with a practical aspect of information security. Mandatory courses Security Management Introduction to Cryptography & Security Mechanisms Legal and Regulatory Aspects of e-commerce Security Technologies Other extra optional modules that can be followed only in Royal Holloway campus: Ŷ Network Security Ŷ Computer Security (Operating Systems) Ŷ Advanced Cryptography Ŷ Database Security Ŷ Software Security Ŷ Digital Forensics Ŷ Security Testing Theory & Practice Alternative Alternative Application & Business Security Development Smart Cards Standard & Evaluation Criteria Computer Crime Thesis and exams &&

12 To decide whether or not a student will be awarded the MSc degree, and also to decide whether or not a distinction/ merit will be awarded, the assessment results from each of the three programme elements (the core, options, and project elements) will be used. To pass the MSc programme the student will normally need to achieve each of the following: an average of at least 50%, where the average is computed over the three elements, and where the core is given weight twice that given to the other two elements (i.e. so that the core element contributes 50% of the overall mark, and the other two elements 25% each); a minimum of 50% for the core element; minimum of 40% for the options and project elements, and a minimum of 50% for at least one of these two elements. To be awarded a merit in the MSc programme the student will normally need to achieve each of the following: an average of at least 60%, where the average is computed over the three elements, and where the core is given weight twice that given to the other two elements (i.e. so that the core element contributes 50% of the overall mark, and the other two elements 25% each); a minimum of 50% in each of the three elements (i.e.in the core, options, and project elements). To be awarded a distinction in the MSc programme the student will normally need to achieve each of the following: an average of at least 70%, where the average is computed over the three elements, and where the core is given weight twice that given to the other two elements (i.e. so that the core element contributes 50% of the overall mark, and the other two elements 25% each); a minimum of 50% in each of the three elements (i.e.in the core, options, and project elements). The formal Programme Specification is available at: &(

13 Courses Introduction to Cryptography & Security Mechanisms Mandatory course, Rome, 16 January 20 January, 2012 Aims The approach of this module is nontechnical. The primary objectives are to explain why cryptography is needed, what it provides, how basic cryptographic mechanisms work and what issues need to be addressed when implementing cryptography. The mathematical content of this module is minimal. Tutorial support for the elementary mathematics needed for this part of the course will be provided for those who require it. Objectives At the end of this module, students should be able to: - explain exactly what cryptography can be used for - appreciate the differences between various types of cryptosystems and in which situations they are most usefully employed - identify the issues that need to be addressed when assessing what types of cryptographic mechanism are necessary to secure an application - describe several basic cryptographic mechanisms for providing each of the core security services - identify the limitations of cryptography and how to support it within a full security architecture. Students completing this module should not expect to be able to design algorithms. Course content This course is divided into three parts: 1. Setting the Scene: the need for cryptography; core security services provided by cryptography; basic model of a cryptosystem; historical cryptosystems; security in theory and practice 2. The Cryptographic Toolkit: symmetric encryption algorithms; hash functions; message authentication codes; entity authentication techniques; pseudorandom number generators; public key encryption algorithms; digital signatures; freshness techniques; cryptographic protocols 3. Cryptography in Practice: key management; public key infrastructures; legal aspects of cryptography; cryptographic applications. &)

14 Academic staff Essential reading: Prof Keith Martin B.Sc. (Glasgow), PhD (London), CMath FIMA, is Director of the Information Security Group. He joined the ISG as a lecturer in January He received his BSc (Hons) in Mathematics from the University of Glasgow in 1988 and a PhD from Royal Holloway in Between 1992 and 1996 he held a Research Fellowship at the University of Adelaide, investigating mathematical modeling of cryptographic key distribution problems. In 1996 he joined the COSIC research group of the Katholieke Universiteit Leuven in Belgium, working on security for third generation mobile communications. Keith s current research interests include key management, combinatorial cryptography, applications of cryptography and wireless sensor network security. Keith became Director of the ISG in He is an Associate Editor of IEEE Transactions on Information Theory in the area of Complexity and Cryptography. F. Piper and S. Murphy, Cryptography: A Very Short Introduction, Oxford University Press (2002). Highly recommended: S. Levy, Crypto: Secrecy and Privacy in the New Cold War, Penguin Books (2002). S. Singh, The Code Book, Fourth Estate (1999). Legal & Regulatory Aspects of Electronic Commerce Mandatory course, Rome, 20 February-24 February, 2012 Aims This course, which will be directed almost entirely to non-criminal law with an emphasis on legal obligations and liabilities between private parties, will consider fundamental legal concepts and rules which apply to e-commerce activities; legal risk management techniques for information security managers, and the most significant of the regulatory aspects which apply to secure electronic commerce. &*

15 Objectives On completion of this module, students will have gained an understanding of the legal underpinnings and government regulations applying to the use of e-commerce, as well as an understanding of managing legal risk. Course content The module will be divided into three main parts and will involve lectures from a number of legal experts. Part I: The rules an introduction to the law Part II: The rules applied an introduction to corporate legal risk management Part III: Regulatory aspects of e-commerce Academic staff Mr Robert Carolina B.A. (Dayton) J.D. (Georgetown) LL.M. (London) Attorneyat-Law (Illinois, USA) Solicitor (England & Wales) is a Solicitor of the Supreme Court of England & Wales, and a member of both the American and Illinois Bar Associations. He holds degrees from the University of Dayton (B.A.) Georgetown University (Juris Doctor) and the London School of Economics and Political Science (LL.M in International Business Law). Following a period as an in-house with an Internet software development company, he moved to London in Robert is a principal with Origin, a law firm based in London that specialises in intellectual property and information technology. His practice focuses entirely upon commercial transactions and projects involving telecommunications and information technology. Robert routinely represents users, purchasers, developers, and vendors of IT and telecommunications products and services, and regularly advises on electronic commerce transactions and projects. His clients include major multinational financial institutions, as well as technology and e-commerce venture companies located in Europe and the US. Recognised as a leading UK expert on IT law and e-commerce law, he regularly presents academic and commercial courses and workshops on legal aspects of technology procurement and e-commerce. He also serves as the co-editor of Sweet & Maxwell s Encyclopedia of E-Commerce Law. Essential reading Christopher Reed, Internet Law: Text and Materials, Butterworths, 2004 Computer Crime Optional course. Rome, 26 March-30 March, 2012 Aims This module complements other modules by examining the subject from the criminal angle and presenting a study of computer crime and the computer criminal. We will discuss its history, causes, development and repression through studies of surveys, types of crime, legal measures, and system and human vulnerabilities. We will also examine the effects of computer crime through the experiences of victims and law enforcement and look at the motives and attitudes of hackers and other computer criminals. &!

16 Objectives On completion of the module, students should be able to follow trends in computer crime; relate computer security methodologies to criminal methods; detect criminal activity in a computerised environment; apply the criminal and civil law to computer criminality; understand how viruses, logic bombs and hacking are used by criminals, and appreciate the views of business, governments and the media to instances of computer crime. Course content Introduction: types of computer crime, history, surveys, statistics and global connections Legal measures: computer misuse, criminal damage, software piracy, forgery, investigative powers Case studies: investigations into hacking, cases and PC misuse Social engineering Spam, phishing and pharming, malware DoS and distributed DoS: the causes, mechanisms, case studies and countermeasures Network crimes: hacking methodologies via the Internet and attacks to other networks Investigations, incident handling and forensic examination The future: the expansion of the Internet, pornography and other unsuitable material Identity theft and fraud. Academic staff Mr John Austen B.A. FBCS NEBSS is a director of QCC InfoSec Training Ltd and Course Director for the Royal Holloway Diploma in Information Security. He was the Head of the Computer Crime Unit, New Scotland Yard, until September He was a career detective for 30 years, investigating the first major UK computer crime in 1976 and founding the Computer Crime Unit in the first of its type in the world. He was responsible for the first successful arrests and prosecutions against hackers, organised crime groups, and information brokers. He trained all of his own staff, officers from each of the UK Police Forces, and latterly police from Eastern Europe on courses held at the National Police Staff College (in Bramshill, Hampshire). He was the first Chairman of the Interpol Computer Crime Committee, serving from 1991 to 1996 and was responsible for the worldwide standardisation of Police procedure. He is a Fellow of the British Computer Society and a member of its Security Committee. He is a consultant to the Government on Computer Security, the Computer Misuse Act, and British Standard He is a scientific expert to the Legal Affairs Committee, Council of Europe, Strasbourg, and a contributor to its Recommendation for Criminal Procedural Law on Computer Related Crime published in He has been an official adviser to the Governments of the Czech Republic, Poland, and Croatia. During the last 10 years he has presented lectures to Government committees and international conferences throughout the world. &"

17 Essential reading D.E. Denning, Information Warfare and Security, Addison-Wesley, Hedley & Aplin, Blackstone s Statutes on IT and E-Commerce, Oxford University Press. C. Stoll, The Cuckoo s Egg, Pan Book. Security Management Mandatory course. Rome, early November Aims This module emphasises the need for good security management. Its aims are to identify the problems associated with security management and to show how various (major) organizations solve those problems. Objectives On completion of the module, the student will be able to evaluate security management requirements; critically analyze alternative security management strategies and methods; propose effective methods for solving security management problems, and compare and critically evaluate different approaches to security management. Course content The lectures given on this course will mirror the lectures that are given on campus at Royal Holloway. The typical topics that should be covered include Information Security Principles and Management, Governance and the Law, Internal Control and Audit, Risk analysis and Management, Trust, ISO 27001, and Business Continuity. &#

18 Academic staff Dr Lizzie Coles-Kemp B.A.(Hons), M.Sc. Ph.D. (London) was awarded a B.A (Hons) in Scandinavian Studies and Linguistics from the University of Hull in She then worked as a UNIX software trainer and translator for several years, specialising in applications adapted for variants of secure UNIX. In 1991 she joined the Swedish security software company, Dynamic Software AB, eventually becoming director of the UK subsidiary, DynaSoft Ltd, with responsibility for UNIX security and smart card projects across Europe and in the US. In 1997 Lizzie left DynaSoft to become global IT Security Officer for the British Council and completed the Information Security MSc at Royal Holloway. She was also a Lead Assessor for Lloyds Register Quality Assurance (LRQA) auditing organisations to ISO/IEC and tscheme. She now works for the ISG as a senior lecturer in information governance and security management for the BSc in Biomedical Informatics which is a collaborative programme between St George s, University of London, Kingston University and Royal Holloway. Lizzie also contributes to the distance learning version of the Information Security MSc. Her academic research areas are organisational theories applied to design aspects of information security management systems and the visualisation of information security concepts. In 2008 Lizzie completed a Ph.D. in information security management systems at King s College, London. She is a Primary Investigator on the Visualisation and Other Methods of Expression (VOME) project which is joint research between Cranfield University, Salford University, Royal Holloway (University of London), Sunderland City Council and Consult Hyperion. The project is funded by The Technology Strategy Board, Engineering and Physical Sciences Research Council (EPSRC) and Economic and Social Research Council (ESRC). Essential reading Steve Purser, A Practical Guide to Managing Information Security, Artech House, 2004 &$

19 Gurpreet Dhillon, Principles of Information System Security: text and cases, Wiley, 2007 Smart Cards/Tokens Security & Applications Optional course. Rome, late November Aims This training programme in smart cards, tokens, security and applications is believed to be unique in terms of its breadth of content material, the depth of information and the quality of international expert lecturers. There is strong emphasis on real-world applications and linkages with industry, making the course an ideal grounding for students considering a future career or preparing for further research in this field. The course assumes little previous knowledge of smart cards and Radio Frequency Identifiers (RFIDs), and initially leads the students through the basics of smart card and token platforms as well as an in-depth coverage of their secure manufacture. The course moves on to consider major applications of the technology with particular focus on mobile communication, banking, passports/id, Transport and satellite TV, but also looks to the future and discusses the impact of new technologies, including Trusted Platform Modules (TPM) and Near Field Communication (NFC). There is a strong emphasis on security aspects through the course, but in particular the formal design criteria for secure smart card/token systems is introduced as well as an insight to the wide range of security attacks and countermeasures that need to be considered when planning commercial products. The course does not end at the theoretical level but addresses the practical development of applications for smart cards (with particular emphasis on JAVA) and subsequent operational management of issued devices using OTA (Over The Air) and related techniques. Objectives By the end of the module the students should: have a general understanding of smart cards, RFIDs and their underlying technologies; have an appreciation of the trusted production environment used to manufacture smart cards; know the various operating systems in use, plus associated interoperability and security properties; understand SIM/ USIM cards and how security is provided for mobile telephony; have an overview of how smart cards are used for secure banking and finance; understand how smart cards are used for passports, IDs and satellite TV; be aware of new smart chip & token technologies (including TPM/NFC) for securing platforms and applications; understand common-criteria security applied to smart cards and tokens; be aware of the range of attacks used against smart cards/rfids and their countermeasures plus how smart cards are tested/evaluated; understand remote communication with the SIM (OTA) and secure SIM lifecycle management. &%

20 Academic staff Dr Kostas Markantonakis B.Sc. (Lancaster University), M.Sc., Ph.D. (London) Dr Konstantinos Markantonakis B.Sc. (Lancaster University), M.Sc., Ph.D. (London) received his BSc (Hons) in Computer Science from Lancaster University in 1995, his MSc in Information Security in 1996, his PhD in 2000 and his MBA in International Management in 2005 from Royal Holloway, University of London. He is currently a Reader in the Information Security Group. His main research interests include smart card security and applications, secure cryptographic protocol design, Public Key Infrastructures, key management, mobile phone security, embedded systems. Since completing his PhD, he has worked as an independent consultant in a number of information security and smart card related projects. He has worked as a Multi-application smart card Manager in VISA International EU, responsible for multi-application smart card technology for southern Europe. More recently, he was working as a Senior Information Security Consultant for Steer Davies Gleave, responsible for advising transport operators and financial institutions on the use of smart card technology. He is also a member of the IFIP Working Group 8.8 on Smart Cards. He continues to act as a consultant on a variety of topics including smart card security, key management, information security protocols, mobile devices, smart card migration program planning/project management for financial institutions, transport operators and technology integrators. Dr Keith Mayes B.Sc. Ph.D. (Bath) CEng MIEE received his BSc (Hons) in Electronic Engineering in 1983 from the University of Bath, and his PhD degree in Digital Image Processing in He is an active researcher/author with publications in numerous conferences, books and journals. His interests include the design of secure protocols, communications architectures and security tokens as well as associated attacks/countermeasures. During his first degree he was employed by Pye TVT (Philips) which designed and produced TV broadcast and studio equipment. His PhD was sponsored by Honeywell Aerospace and Defence and on completion he accepted their offer of a job. In 1988 he started work for Racal Research where he worked on a wide range of research and advanced development products and was accepted as a Chartered Engineer. In 1995 he joined Racal Messenger to continue work on a Vehicle Licence plate recognition system (Talon) and an early packet radio system (Widanet/Paknet). In 1996 Keith joined Vodafone as a Senior Manager working within the Communication Security and Advanced Development group, under Professor Michael Walker. Early work concerned advanced radio relaying systems and involved participation in international standardisation (ETSI SMG2). Later he led the Maths & Modelling team and eventually took charge of the Fraud & Security group. During this time he was training in intellectual property and licensing, culminating in membership of the Licensing Executives Society and the added responsibility for patent issues in Vodafone UK. In 2000, following some work ('

identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

MSc in Information Security Royal Holloway University of London Royal Holloway is widely recognised on the world stage as one of the UK s leading teaching and research university institutions. One of the

CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

LOUGHBOROUGH UNIVERSITY Programme Specification Computer Science Please note: This specification provides a concise summary of the main features of the programme and the learning outcomes that a typical

Master of Science in Cyber Security and Management Introduction Realizing the importance of protecting her critical national information infrastructure, Malaysia has introduced the National Cyber Security

UNIVERSITY OF EAST LONDON POSTGRADUATE PROGRAMME SPECIFICATION MSc Information Security and Digital Forensics This programme is only offered at: Final award Intermediate awards available Mode of delivery

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

PROGRAMME SPECIFICATION KEY FACTS Programme name Engineering with Management and Entrepreneurship Award BEng (Hons) School School of Mathematics Computer Science and Engineering Department or equivalent

Part-time MSc in Cyber Security from Northumbria University masters.qa.com Thank you for your interest in Northumbria University s part-time MSc in Cyber Security programme, delivered in Central London

Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber

PROGRAMME SPECIFICATION KEY FACTS Programme name MSc Construction Management Award MSc School School of Engineering and Mathematical Sciences Department or School of Engineering and Mathematical Sciences

Programme Specification Course record information Name and level of final award: MSc Cyber Security and Forensics Name and level of intermediate awards: Postgraduate Diploma in Cyber Security and Forensics

Diploma in Business and Information Management Diploma in Computer Forensics Diploma in Web Technologies PROGRAMME STRUCTURE Aims & Objectives Business and Information Management This course aims to provide

Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff

Dr. Waleed A. Alrodhan (Biographical Sketch) Waleed was born in the Kingdom of Saudi Arabia in 1981. He has received his B.Sc. degree in Computer Sciences from King Saud University (2002), his M.Sc. degree

Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

MSc/PG Diploma/PG Certificate in Project Management For students entering in October 2006 Awarding Institution: Teaching Institution: Faculty of Science The University of Reading The University of Reading

The University of Texas at San Antonio 1 Department of Information Systems and Cyber Security All graduate programs in Information Systems and Cyber Security are accredited by AACSB International The Association

Contents Message from the Pro Vice Chancellor...1 The University of Greenwich...2 The Business School...3 The Hong Kong Management Association...4 Why the University of Greenwich MBA (International Business)

MSc in Network Centred Computing (NCC) For students entering in October 2009 Awarding Institution: The University of Reading Teaching Institution: The University of Reading, with contributions from other

SCHOOL OF COMPUTING & MATHEMATICAL SCIENCESB Computer Security and Forensics BSc Hons Greenwich Campus www.gre.ac.uk/cms Why study this programme? This degree will equip you to become an ICT professional

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

MSc Multimedia Systems and Communications Engineering Programme Specification Introduction This Programme Specification is a concise summary of the main features of the MSc in Multimedia Systems and Communications

MSc in Physics Research For students entering in 2006 Awarding Institution: The University of Reading Teaching Institution: The University of Reading Faculty of Science Programme length: 12 or 24 months

MSc in Construction Cost Management For students entering in October 2005 Awarding Institution: Teaching Institution: Faculty of Science The University of Reading The University of Reading Programme length:

COURSE SPECIFICATION COURSE TITLE: BSc (Hons) Culinary Arts Management PLEASE NOTE: This specification provides a concise summary on the main features of the course and the learning outcomes that a typical